Grid based network address space browsing for network traffic visualization

Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

抄録

The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

元の言語英語
ホスト出版物のタイトルProceedings of the 2006 IEEE Workshop on Information Assurance
出版者IEEE Computer Society
ページ261-267
ページ数7
ISBN(印刷物)1424401305, 9781424401307
出版物ステータス出版済み - 1 1 2006
イベント2006 IEEE Workshop on Information Assurance - West Point, NY, 米国
継続期間: 6 21 20066 23 2006

出版物シリーズ

名前Proceedings of the 2006 IEEE Workshop on Information Assurance
2006

その他

その他2006 IEEE Workshop on Information Assurance
米国
West Point, NY
期間6/21/066/23/06

Fingerprint

Computer networks
Visualization
Statistical methods
Processing

All Science Journal Classification (ASJC) codes

  • Engineering(all)

これを引用

Le Malécot, E., Kohara, M., Hori, Y., & Sakurai, K. (2006). Grid based network address space browsing for network traffic visualization. : Proceedings of the 2006 IEEE Workshop on Information Assurance (pp. 261-267). [1652104] (Proceedings of the 2006 IEEE Workshop on Information Assurance; 巻数 2006). IEEE Computer Society.

Grid based network address space browsing for network traffic visualization. / Le Malécot, Erwan; Kohara, Masayoshi; Hori, Yoshiaki; Sakurai, Kouichi.

Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, 2006. p. 261-267 1652104 (Proceedings of the 2006 IEEE Workshop on Information Assurance; 巻 2006).

研究成果: 著書/レポートタイプへの貢献会議での発言

Le Malécot, E, Kohara, M, Hori, Y & Sakurai, K 2006, Grid based network address space browsing for network traffic visualization. : Proceedings of the 2006 IEEE Workshop on Information Assurance., 1652104, Proceedings of the 2006 IEEE Workshop on Information Assurance, 巻. 2006, IEEE Computer Society, pp. 261-267, 2006 IEEE Workshop on Information Assurance, West Point, NY, 米国, 6/21/06.
Le Malécot E, Kohara M, Hori Y, Sakurai K. Grid based network address space browsing for network traffic visualization. : Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society. 2006. p. 261-267. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance).
Le Malécot, Erwan ; Kohara, Masayoshi ; Hori, Yoshiaki ; Sakurai, Kouichi. / Grid based network address space browsing for network traffic visualization. Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, 2006. pp. 261-267 (Proceedings of the 2006 IEEE Workshop on Information Assurance).
@inproceedings{5eb5bf40cd4c43b18dd994010f7e7c17,
title = "Grid based network address space browsing for network traffic visualization",
abstract = "The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.",
author = "{Le Mal{\'e}cot}, Erwan and Masayoshi Kohara and Yoshiaki Hori and Kouichi Sakurai",
year = "2006",
month = "1",
day = "1",
language = "English",
isbn = "1424401305",
series = "Proceedings of the 2006 IEEE Workshop on Information Assurance",
publisher = "IEEE Computer Society",
pages = "261--267",
booktitle = "Proceedings of the 2006 IEEE Workshop on Information Assurance",
address = "United States",

}

TY - GEN

T1 - Grid based network address space browsing for network traffic visualization

AU - Le Malécot, Erwan

AU - Kohara, Masayoshi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2006/1/1

Y1 - 2006/1/1

N2 - The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

AB - The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the use of firewalls for instance. However, these precautions are not always enough and so they also need to monitor the network traffic in order to detect anomalies and intrusions. Usually, system administrators use automated systems to process network traffic logs and to analyze them. This processing is based on learning techniques, signature databases or statistical analysis. Another approach is to use visualization techniques to display these logs and to favor user interaction with the data. This paper presents a visualization design based on interactive grids representing the network space. The network traffic is then displayed on these grids. We also introduce a prototype of this design that has been implemented to test its validity.

UR - http://www.scopus.com/inward/record.url?scp=33845941474&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845941474&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33845941474

SN - 1424401305

SN - 9781424401307

T3 - Proceedings of the 2006 IEEE Workshop on Information Assurance

SP - 261

EP - 267

BT - Proceedings of the 2006 IEEE Workshop on Information Assurance

PB - IEEE Computer Society

ER -